medusaransomewareattack
Medusa Ransomware Attack
KoreWealth
2/25/20263 min read


The Medusa ransomware attacks from November 2025 to February 2026 represent a chilling escalation in the ransomware landscape, blending traditional cybercrime with state-sponsored opportunism in a way that feels particularly dangerous. In my view, this period marks a worrying "hybrid threat" phase where financially motivated RaaS (ransomware-as-a-service) operators like Spearwing's Medusa inadvertently (or perhaps deliberately) provide a convenient tool for more sophisticated actors, including North Korea's Lazarus Group. This blurs the lines between profit-driven crime and geopolitical extortion, making defenses harder and raising the stakes for vulnerable sectors like healthcare.
Background on Medusa (Quick Recap)
Medusa emerged around 2021–2023 as a classic RaaS model: developers provide the malware, affiliates execute attacks, and everyone shares profits. It uses double extortion (encrypt files + steal/exfiltrate data for leak threats) and sometimes triples it with DDoS or customer harassment. By early 2026, the group had claimed over 500 victims total (per trackers like Ransomware.live), with hundreds in critical sectors. Ransoms vary wildly—from tens of thousands to millions—but averages in this window hovered around $260,000 for recent claims.The November 2025–February 2026 window saw steady activity, but the real bombshell dropped in late February 2026: evidence from Symantec and Carbon Black linking Lazarus Group (North Korea's notorious state-backed hackers) to Medusa deployments.
Key Developments and Attacks in This Period
November 2025 onward: Medusa's leak site began listing U.S. healthcare and nonprofit victims more prominently. At least four confirmed in this category since early November, including:
A mental health nonprofit.
An educational facility serving children with autism. These weren't massive enterprises but sensitive organizations handling vulnerable people's data—exactly the kind of targets that maximize pressure and public outrage.
Broader activity: Ransomware.live and other trackers show dozens of new claims monthly, spanning manufacturing, finance, education, and more. Examples include:
Hospitality firms (e.g., Australian Oscars Group in late 2025, with 130,000+ files exfiltrated).
Various U.S. entities like emergency services districts and medical providers listed as recently as February 2026 (e.g., Balloons Everywhere, Hays County Emergency Services, Grandview Family Medicine—attacks dated late January/early February 2026).
The Lazarus connection (February 2026 revelation): This is the standout story. Researchers uncovered Lazarus operators using Medusa in:
A successful attack on a large (non-strategic) entity in the Middle East for pure financial gain.
An unsuccessful attempt on a U.S. healthcare organization.
Lazarus leveraged tools like Comebacker backdoor, Blindingcan RAT, and Infohook stealer before dropping Medusa. This isn't Lazarus's first ransomware rodeo—they've run healthcare extortion before (e.g., via subgroups like Stonefly, indicted in 2025)—but adopting a commercial RaaS tool shows pragmatism: why build custom when you can rent effective malware?
Why healthcare? It's lucrative (sensitive data = high extortion leverage), often under-defended, and disruptions can be life-threatening—perfect for both profit and potential state leverage (funding North Korea's programs via crypto ransoms).
My Opinion: Why This Period Feels Like a Turning Point
In my assessment, November 2025–February 2026 isn't just "more Medusa"—it's a signal that state actors are increasingly piggybacking on commoditized cybercrime tools. Lazarus isn't the first nation-state to dabble in ransomware (Iranian and Russian groups have too), but their explicit use of Medusa shows how porous the line between "cybercrime" and "cyber espionage/funding ops" has become.
Pros for attackers → Lower barriers: Affiliates (or state hackers posing as them) get reliable encryption/exfil without developing everything from scratch.
Cons for defenders → Attribution gets muddier. Was a healthcare hit "just" Medusa affiliates, or Lazarus funding ops? This complicates responses from governments and law enforcement.
Healthcare vulnerability → Persists as a soft target. Attacks here aren't new, but the North Korean angle adds geopolitical risk—imagine if disruptions coincide with tensions on the Korean Peninsula.
Overall, this era underscores how ransomware has evolved from "nuisance crime" to a hybrid threat ecosystem. Pure cybercrime groups provide the infrastructure, while state actors dip in for funds or disruption. The average $260K demands seem "modest" compared to mega-payouts, but the volume and targeting make the cumulative impact huge.
Bottom Line and Outlook
Medusa remains highly active into 2026, with no signs of slowing. The Lazarus link is a wake-up call: expect more state-crime crossovers. Organizations (especially in healthcare/nonprofits) should prioritize basics—patching, MFA, segmenting networks, monitoring RMM tools (Medusa loves abusing them like SimpleHelp), and having offline backups. Paying ransoms just funds the next attack—better to invest in resilience.
If you're in a potentially targeted sector, treat this as a "now" problem, not a "someday" one. The blend of profit and politics here makes it scarier than your average ransomware wave.
